LOL! When will Trump shut down the NSA spying on EVERY human? He's the boss!! Why doesn't he do that?Did he think he was exempt?HE'S THE BOSS!!! - HE CAN STOP THIS VIOLATION OF OUR CONSTITUTIONAL RIGHTS!

A lot of ink has been spilled on the latest allegations that Obama wiretapped the Trump campaign last fall, but very few people have gotten at the heart of the issue. As usual, Ron Paul is the only one from the mainstream realm willing to state the truth plainly: They are wiretapping everyone, and they don't need paperwork or special signed orders to do it.

WikiLeaks claims CIA targeted iPhones, Microsoft Windows and turned Samsung TVs into microphones as part of global hacking programmehttp://www.mirror.co.uk/news/world-news/year-zero-series-wikileaks-cia-9981832The first full part of Year Zero, comprises of 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence, according to Julian Assange

WikiLeaks has claimed the CIA targeted iPhones, Microsoft Windows and turned Samsung TVs into microphones as part of global hacking programme.

The secretive organisations is about to release a huge trove of confidential documents from the U.S. Central Intelligence Agency as part of its mysterious Year Zero series.

The leak, code-named "Vault 7," is the "largest ever publication of confidential documents on the CIA," WikiLeaks said today.

We'll be bringing you the very latest updates, pictures and video on this breaking news story.

07 marzo 2017It has happened again. Seven years after Chelsea Manning and four years after Edward Snowden, the US security complex is facing what appears to be a new serious crisis. WikiLeaks just published 8,761 internal documents on the CIA's hacking programme. According to the organisation, this leak is just the first part of its new series on the US Central Intelligence Agency: WikiLeaks could have tens of thousands of files and even Cia cyberweapons.

ITALIAN VERSION?

“La Repubblica” was given exclusive advance access to the 8,761 files. The documents appear recent: they include references to the operating systems “Windows 10”, which has only been available since 2015. La Repubblica was unable to validate them considering the last-minute access to thousands highly technical documents, however now that WikiLeaks has published them, software experts are likely to be able to verify them relatively easily, as many files consists of technical details and procedures which can be assessed independently.

These files allow to shed light on a high-tech part of the CIA which has remained completely in the shadows. Three years ago the news that the Agency had spied on the US Senate intelligence committee's years-long effort to investigate CIA's tortures by penetrating the computers of the committee staff members sparked public outrage and political fury. However, little has been known so far about the Central Intelligence Agency's skills and capabilities on hacking, malware and IT tools. These files appear to provide an insight on them for the first time, detailing internal teams and projects.

Many of these documents are classified and contain even the identities of CIA's personnel, which WikiLeaks has not published but it has rather redacted. According to the organisation, these files have been available in “an isolated, high-security network situated inside the Cia's Center for Cyber Intelligence in Langley, Virginia”, but recently the Cia “lost control of the majority of its hacking arsenal”: this archive “appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive”.

The organisation of Julian Assange has decided to publish these documents, while at the same time avoiding “the distribution of 'armed' cyberweapons, until a consensus emerges on the technical and political nature of the Cia programme and how such 'weapons' should be analyzed, disarmed and published”, because “once a single cyber 'weapons' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike”. WikiLeaks claims that the source for these documents made a statement to the organisation, explaining his rationale for providing these files: “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons”.

Inside the Cia's hacking programme Never before had it been possible to look deep inside the software develpment group of the Central Intelligence Agency. Documents allow understanding how on the top there is the so-called “Engineering Development Group” (EDG), which has branches like the Embedded Development Branch (EDB), the Operations Support Branch (OSB), the Remote Device Branch (RDB) and many more, each of them with its own projects and mission.

The EDB's mission, for example, is "To be the premiere development shop for customized hardware and software solutions for Information Operations". By utilizing operating system knowledge, hardware design, software craftsmanship, and network expertise, EDB develops software and hardware solutions "to support the "Information Operations Center" mission.

Last year, speaking to the US Senate the head of the US intelligence community, James Clapper, declared: "In the future, intelligence services might use (the internet of things) for identification, surveillance, monitoring, location tracking". Clapper was certainly not an oracle predicting the future: according to the WikiLeaks' files, the CIA has been able since 2014 to implant malware on on a well-known model of smart TV to capture conversations inside the room where the TV is connected to the Internet. The programme is called "Weeping Angel" and it was developed by the Embedded Development Branch in collaboration with the British intelligence services.

However, at least at the beginning Weeping Angel was not free from tricky challenges: "updating firmware over the internet", the Agency writes in its documents, "may remove implant (not tested) or portions of it" and a blue LED on the back created headaches to the CIA, by remaining powered even when the TV appeared to be powered off: they call it Fake-off. That blue LED could reveal that something strange was going on inside the spied TV. According to the documents, the Agency's tech people tried to address this problem in June 2014 in a joint workshop with the British intelligence agency MI5 and the Agency was ready to focus on new challenges: how to capture video and video snapshots from that smart TV. Since 2015, concerns had emerged about smart TVs ability to spy: files published today by WikiLeaks appear to confirm those concerns were not paranoia.

The Company and the dinosaurs Old and new devices are targeted by the Central Intelligence Agency, which uses both commercial and open sources software to develop its products to spy on future technologies like the internet of things devices, but also on very old ones, like the floppy disks.

A programme called "Pterodactyl", a curious name probably referring to a dinosaur technology like the floppy disk, and developed by the Embedded Development Branch has the stated goal "to provide the asset with the ability to rapidly copy 3.5" floppy disk in a covert manner. Among the requirements needed for this programme is the "obfuscation" requirement: "in order to conceal activities on the device as much as possible, the device should behave as normally as possible on the device filesystem", writes the Agency's branch.

Floppy disk technology is often dismissed as a relic of the 1980s with no relevant use, however last year a US government report allowed us to learn that they are still used to control the system that coordinates the operational functions of the US nuclear forces: from intercontinental ballistic missiles to nuclear bombers.

The Hacked Team The Central Intelligence Agency's software development group appears to learn not only from British services like MI5 but also from other companies' disgraces.

In 2015, when the Italian company Hacking Team was hacked and its internal files and correspondence was published by WikiLeaks, the CIA did not loose the opportunity to examine the Hacking Team's material.

"The data dump includes everything anyone could imagine that a company would have in its infrastructure", writes the Agency in its files, "In the interest of learning from and levereging existing work, it was decided to review selected pieces of publicly dumped data".

A Cia operative? Please fill the form Intelligence operations supported by the CIA's sofware development group are not identified in the documents: these files do not allow us to understand targets' identities and operations.

Are these software and hardware tools used in a legitimate manner to spy on terrorists? Are they used for operations involving serious human rights violations like CIA tortures or even for criminal purposes, like spying on the US Senate intelligence committee? The documents do not provide specific answers to these questions, however they do provide answers for CIA's skills and capabilities and for its programs and goals. According to WikiLeaks, “The Agency's hacking division freed it from having to disclose its often controversial operations to the Nsa (its primary beaurocratic rival) in order to draw on the Nsa's hacking capacities”.

An interesting questionnaire details the information Cia's tech people need to acquire before devising the right software and hardware tools suitable for a certain operation. "Who will be the operator of the tool?", the questionnaire asks, "Who is the target of collection (of data and information)?", the questionnaire continues, "An asset? A foreign information operation? A foreign intelligence agency? A foreign government entity? A system administrator or comparable technical target?" and “how much time do you have on the target? less than 1 minute? less than 5 minutes? between 5 and 10 minutes?”.

In the heart of Europe The files mention that the Agency's Center for Cyber Intelligence Europe Engineering (CCIE) is based in Frankfurt and it is responsible for major areas of the world, spanning from Europe (hence Italy included) to North Africa and the Middle East.

When the CIA personnel are requested to travel for duty, they have a list of "hotels [that] are pre-approved by Frankfurt Base" and are suggested some the cover story for action. "If you are OVERT CIA", the file reveal, then "your cover-for-action (for this trip) is State Department employee" and “Your point of contact's actual job” is “Frankfurt Base Officer or Declared CCIE TIO”. According to the book “The Wizards of Langley”, authored by the US intelligence expert Jeffrey Richelson who reconstructed CIA's Directorate of Science and Technology , “TIO” is an acronym which stands for “Technology Investment Office”.

Commenting this first part of its Cia series, WikiLeaks said that it has redacted “tens of thousands of Cia targets and attack machines throughout Latin America, Europe and the United States” and while stressing its decision of “avoiding the distribution of 'armed' cyberweapons”, Julian Assange warned against the risk of their proliferation:

“There is an extreme proliferation risk in the development of cyber 'weapons. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which result from the inability to contain them combined with their high market value, and the global arms trade”.

Logged

And the King shall answer and say unto them, Verily I say unto you, Inasmuch as ye have done it unto one of the least of these my brethren, ye have done it unto me.Matthew 25:40

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.

By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks. (continued)

... heads need to roll. The Trump admin goingafter the Obamanistas, following the Watergatemodel (hacking the opposing party during anelection) is our best shot at turning some of thiscrap around. If the Watergate model (precedence)holds, what we are seeing now is the 'coverup':

The most revealing aspect of the controversy surrounding President Donald Trump’s accusation that his predecessor spied on him has been the speed with which the mainstream media abandoned the accusations of “Russian hacking” as soon as Barack Obama was vulnerable.

White House Photo / Pete Souza

As Andrew McCarthy of National Review observes, the denials Sunday by Obama’s former Director of National Intelligence, James Clapper, suggest everything the mainstream media claimed about Russian influence was false:

He writes:

For months, the media-Democrat complex has peddled a storyline that the Putin regime in Russia hacked the U.S. presidential election … Well, this weekend, the potentially explosive story [surveillance] detonated. It happened in the now familiar way: jaw-dropping tweets by President Trump. … Now that they’ve been called on it, the media and Democrats are gradually retreating from the investigation they’ve been touting for months as the glue for their conspiracy theory.

Quote

Given the choice between attacking Trump with the Russian hacking story on the one hand, and protecting Obama from the government surveillance story on the other, they have chosen the latter.

As we have learned from Snowden's whistleblowing, and today, with the CIA docs released by Wikileaks, further confirming that we are all being spied on, we can assume that Trump has been spied on. Everyone is under surveillance - no exceptions.

So... the 'document' requesting surveillance on Trump won't exist: it isn't necessary. What's necessary is to discover whatever method the PTB would have to access EXISTING surveillance data. Is there a little app created by Palantir that will show interested parties the data?I bet there IS NO formal paper trail; just some login record on a database that shows some digital footprints by some user in the Clinton/Obama camp. The Awan Brothers (you know, the four muslim brothers working at the whitehouse in the IT department during the Obama administration, who had access to sensitive intel databases. Maybe those guys...)

This is, well, sketchy – to say the least. The Daily Caller is reporting that three House Intelligence “staffers” have been fired as part of an ongoing security probe.

Abid Awan, Imran Awan and Jamal Awan, are three brothers who worked within the IT department for members of the House Permanent Intelligence Committee.

Yes, you read that correctly.

You might remember, the House Intelligence Committee is part of the deepest oversight network with responsibility over the most sensitive and secretive government intelligence, including covert anti-terrorism activity. The Majority Chairman (Nunes) and Minority Chair (Schiff) sit on the CIA oversight team known as the “Intelligence Gang of Eight“:(see photo of Gang of Traitors above...)

UPDATE: It would be imprudent of CTH not to point out the “TIMING” here. By nature of the relationship to the G08 oversight aspect – the recently authorized Trump operation in Yemen would have been a part of the advance briefing to this very select oversight committee. The exact same oversight committee these three brothers worked in the IT department for….

♦ Does the firing have any potential attachment to the outcome in Yemen?

♦ Exactly like Benghazi, the Washington DC cover your ass machine would never, ever allow sunlight upon such a consequential intelligence compromise. They would never allow, nor even launch, an investigation in that regard. Too dangerous.

As we have learned from Snowden's whistleblowing, and today, with the CIA docs released by Wikileaks, further confirming that we are all being spied on, we can assume that Trump has been spied on. Everyone is under surveillance - no exceptions.

All the more reason for a critical mass of informed and enraged Americans to unite across partisan lines for the purpose of exerting round-the-clock pressure on Congress to pass (over a presidential veto, if necessary) the Surveillance State Repeal Act:

Unfortunately it seems unlikely that this will happen any time soon, because the vast majority of Americans are too busy either (a) whining and complaining about what an evil villain Trump is, or (b) gushing and fawning over each and every slogan, platitude and applause line that comes out of Trump's mouth.

All the more reason for a critical mass of informed and enraged Americans to unite across partisan lines for the purpose of exerting round-the-clock pressure on Congress to pass (over a presidential veto, if necessary) the Surveillance State Repeal Act:

Unfortunately it seems unlikely that this will happen any time soon, because the vast majority of Americans are too busy either (a) whining and complaining about what an evil villain Trump is, or (b) gushing and fawning over each and every slogan, platitude and applause line that comes out of Trump's mouth.

Absolutely - and the problem is that everyone is SO DISTRACTED by the "crisis du jour"!! It's frustrating - and you even find people saying, "well, I have nothing to hide" ... as if the right to privacy was unnecessary. It's sickening.

Logged

And the King shall answer and say unto them, Verily I say unto you, Inasmuch as ye have done it unto one of the least of these my brethren, ye have done it unto me.Matthew 25:40

“All of Germany hears the Führer with the People’s Receiver,” reads a World War II propaganda poster. It was advertising the Volksempfänger – or, the People’s Receiver – described by the US Holocaust Museum which contains one of the radios in its collection in Washington D.C. as:

Goebbels’s ministry recognized the tremendous promise of radio for propaganda. It heavily subsidized the production of the inexpensive “People’s Receiver” (Volksempfänger) to facilitate sales. By early 1938, the number of radios in German homes surpassed more than 9 million, roughly one for every two German households. Three years later, this figure rose to almost 15 million, providing 50 million Germans with regular radio reception.

The radio lacked the capability to receive foreign radio stations, and on its dial, only German and Austrian stations were marked. This – in conjunction with radio jamming efforts – was a deliberate attempt to confine the German public’s access to information to only that emanating from Berlin.

Quote

According to archives maintained by Yale University, during the Nuremberg trials after the war, Nazi Germany’s Minister of Armaments and War Production, Albert Speer would remark (emphasis added):Hitler’s dictatorship differed in one fundamental point from all its predecessors in history. His was the first dictatorship in the present period of modern technical development, a dictatorship which made complete use of all technical means in a perfect manner for the domination of its own nation. Through technical devices such as radio and loudspeaker 80 million people were deprived of independent thought. It was thereby possible to subject them to the will of one man.

Should a similar dictatorship rise today, seeking to make complete use of all technical means in a perfect manner for the domination of global populations, it is very likely they would pursue similar methods – not over radio waves – but by dominating the 21st century’s primary means of communication – the Internet.

Facebook Zero – the Modern-Day “People’s Receiver”

Facebook Zero is a service provided by Facebook in cooperation with mobile phone services worldwide. It is essentially the ability to use Facebook over cellular phone networks without being charged. It is part of a wider scheme called “zero-rating,” which telecom giants are using to selectively provide content for its users.

It represents the complete circumvention of the concept of net neutrality in which all information traveling across the Internet is treated equally. Net neutrality has become the front line in today’s battle for and against “independent thought,” just as Germany controlling the radio waves within its borders represented a similar battled during the 1930’s and 1940’s.

How effective is Facebook’s technical control over independent thought?

Indonesians surveyed by Galpaya told her that they didn’t use the internet. But in focus groups, they would talk enthusiastically about how much time they spent on Facebook. Galpaya, a researcher (and now CEO) with LIRNEasia, a think tank, called Rohan Samarajiva, her boss at the time, to tell him what she had discovered. “It seemed that in their minds, the Internet did not exist; only Facebook,” he concluded.

The article reveals that the same trend can be seen beyond Indonesia, across Southeast Asia, Africa, and other regions targeted by Facebook Zero’s scheme. The article also reveals the obvious fact that surveys and research indicate the reality of Facebook Zero contradicts the stated goals of Facebook.

The article would claim (emphasis added):

Quote

Since at least 2013, Facebook has been making noises about connecting the entire world to the internet. But even Sheryl Sandberg, Facebook’s operations head, admits that there are Facebook users who don’t know they’re on the internet. So is Facebook succeeding in its goal if the people it is connecting have no idea they are using the internet? And what does it mean if masses of first-time adopters come online not via the open web, but the closed, proprietary network where they must play by Facebook CEO Mark Zuckerberg’s rules?

Quartz’ article would explain – in depth – how services are moving away from websites and toward Facebook – which becomes a problem specifically because of “Zuckerberg’s rules.”The Modern Day Destruction of Independent Thought

Facebook is more than just a social media network. When it was first conceived, users were free to follow others as they wished, and would see posts of those they followed in real-time. By 2014, however, Facebook had begun tampering with how users viewed content from other users they followed.

A user’s “News Feed” was now being regulated not by the user, but by algorithms created by Facebook. Content providers found their reach to their audiences plummet – and unless they were willing to pay to reach more users, it would remain that way.

Rather than showing people all possible content, News Feed is designed to show each person on Facebook the content that’s most relevant to them. Of the 1,500+ stories a person might see whenever they log onto Facebook, News Feed displays approximately 300. To choose which stories to show, News Feed ranks each possible story (from more to less important) by looking at thousands of factors relative to each person

.

In reality, these “factors” may or may not have anything to do with what is relative to “each person.” And with Facebook’s growing involvement under the US State Department, manipulating political systems worldwide, and its recent pledge to join the war on “fake news,” it is likely these factors will be more related to what special interests feel Facebook should make relevant, than the actual individuals viewing their own News Feed.

In other words, Facebook has constructed a modern day People’s Receiver for corporate-financier special interests – with alternatives omitted from the tuning dials, and lacking the technical ability to receive alternative information from outside Facebook’s carefully controlled information space. It is the modern day destruction of independent thought – an information cage many – like the German people during the 1930-40’s may not even realize they’re locked in.

Just as people fought hard to up end the Nazi propaganda machine during World War II, people today are and must continue to confront, undermine, and eventually displace Facebook’s monopoly over modern day communication. Unlike Nazi Germany’s People’s Receivers, Facebook doesn’t taint and skew the perception of just 80 million Germans, but includes a user base spread out across the planet and numbering nearly 2 billion.http://journal-neo.org/2017/03/07/facebook-zero-and-the-peoples-receiver-2/

Logged

And the King shall answer and say unto them, Verily I say unto you, Inasmuch as ye have done it unto one of the least of these my brethren, ye have done it unto me.Matthew 25:40

Inspired by ‘War is a Racket’ by Maj. Gen. Smedly Darlington Butler U.S.M.C

Under the threat of war, the cost of defense is never too high.A nation is under significant obligation to protect its investments where ever they may be. What we see now, is the transition from physical to electronic defense.

The United States is returning to Cold War status. In preparation for this the advancement of technology and the power of the intelligence community is of the foremost importance. In order to maintain a position of dominance, the government must sustain its partnership with wartime industry. Through a metamorphosis of the “military industrial complex”, into a new “intelligence industrial complex”, this accomplishment can be witnessed. The ever present fear of terrorism will still be used as justification for sustained engagement. The new terrorist threat comes from what the media refers to as hackers.

The United States’ trade deficit is in the trillions of dollars. The nation must possess assets for which they use to back the value of money sent overseas. China, for example, has accumulated a surplus of US currency. The deficit exists due to the lack of goods being sold in return. These dollars are then stockpiled or used to buy fuel. The oil cartel uses this petro-dollar as the international rate of exchange. There is already discussion to take the world off of this standard. The dollar has already been abandoned in places where once it was used it as a common currency. The United States needs to be ready to compete in the global market, or in default will continue to forfeit property as payment. If the international oil standard were to shift from the dollar, the American economy could be crushed. Places like China would have no reason to continue accepting currency from the United States as a form of trade. In order to continue doing global business, and maintain the standard of living for most Americans, the United States would need to find an acceptable financial solution. It would be necessary to provide a product or service which can be sold on the international market.

With a shift of strategy by the public-private sector, there is the beginning of what could be a record breaking transition. The same corporations, agencies, and institutions which traditionally have been government contractors understand this move, and are shifting production accordingly. International finance, which in the past has funded one or more sides of various conflicts, is already buying into this new deal. With the new President and his many supporters, the official war should be concluded soon. Although there will always be justification for troops stationed around the globe, much funding for war expenses would no longer be necessary.

The companies which produced the equipment, supplied the fuel for the machinery, and paid the workers, would be looking at a massive drop in revenue. To compensate they will begin to offer services in line with the new focus on infrastructure protection. War profits can be an increase of 7856% over peace time.

That is a real historical figure of seven-thousand eight-hundred and fifty-six percent. Profit is the only motivation for the existence of a corporation. Existing funding could be redirected towards new projects and a new war.

A nation needs a real or fabricated threat to justify taxation to its people, for the necessity of its defenses.

... The only question is how the current leadership of the New World Order decide to Counter Attack.

The historic pattern is that such "old generals" cling to the old ways, and will repeat tactics that used to work really well, but are so last century. One of the most successful was 911, but organising such an attack takes a heck of a lot of planning. Will they simply accelerate a plan that is already in motion.... I recall Hitler did his massive surprise attack, Watch on the Rhine, or as we call it the battle of the bulge, because the German Army charging through the Ardenes / Belgium worked for Germany before world war 1, during world war 1, and conquered europe in 1940 so he simply did "bitter clinger" to the tactic in 1944/45 . . . . Expect a spectacular False Flag in 2017, Assassination and anything else that does not work because we have the internet.

IF you want my best guess, the meme to watch is "Hack Attack". They may well stage a cyber attack as a False Flag, look how they are laughably running the story - but imagine if they brought down large sections of the electric grid and blamed it on Russia . . . . because that what the media have pre-programmed the public. They did a similar thing in the run up to 911, which is why several people compete for the title of predicting 911... The media told us in advance.

Logged

And the King shall answer and say unto them, Verily I say unto you, Inasmuch as ye have done it unto one of the least of these my brethren, ye have done it unto me.Matthew 25:40

Flaws in SCADA software, used to monitor and control sensors and operations at utilities and other critical infrastructure facilities, seem to keep coming out of the woodwork:

• Last week, the U.S. ICS-CERT (Industrial Control System Computer Emergency Response Team) issued several advisories about vulnerabilities exposed in SCADA (supervisory control and data acquisition) software. One was in an ActiveXcontrol in WellinTech KingView V6.53 human machine interface (HMI) software used in power, water, and aerospace industries, mostly in China. The researcher publicly released exploit code for the hole and the vendor released an update that resolves the problem. The second vulnerability was reported in Progea's Movicon 11 HMI product, used primarily in Italy. It too has been patched.

• Also last week, a Russian firm released exploits targeting 11 unpatched, or zero-day, holes in SCADA software, which The Register was first to report.

• Three days ago, an Italian researcher publicly released information on dozens of unpatched holes in four different products and released exploits for targeting them. The move prompted an ICS-CERT warning.

• On Tuesday, Spanish researcher Ruben Santamarta told the BugTraq e-mail list that he had found flaws in BroadWin WebAccess, a Web browser-based HMI product from Advantech that ICS-CERT says is used in energy and other industries in North America, Asia, North Africa and the Middle East. Santamarta released details of the vulnerability and exploit code and ICS-CERT issued an alert.

• And yesterday, ICS-CERT released yet another advisory, this one warning about a SQL (Structured Query Language) vulnerability in the Ecava IntegraX or HMI product that could allow data leakage or manipulation as well as remote code execution on the backend host running the database service. Ecava has developed a patch for the hole.Security problems with software used to monitor and control systems in the electric grid, refineries, gas pipelines, and other critical operations are moving to the forefront as the industries adopt Web-based technologies and connect previously isolated networks to the Internet.

"What is the acceptable tolerable level for security with industrial control systems? We don't know," Mike Ahmadi, co-founder of consultancy GraniteKey told CNET. "Systems have been isolated from the outside world...It's a very significant change we're going through right now."

While the SCADA bug reports appear to be accelerating, it's unclear if any of the vulnerabilities have been used in attacks on working plants or systems.

However, last year the threat became reality with Stuxnet, sophisticated and multipronged attack targeting specific Siemens software used in industrial control operations that experts said appeared to be directed at nuclear facilities in Iran.

Flaws in SCADA software, used to monitor and control sensors and operations at utilities and other critical infrastructure facilities, seem to keep coming out of the woodwork:

• Last week, the U.S. ICS-CERT (Industrial Control System Computer Emergency Response Team) issued several advisories about vulnerabilities exposed in SCADA (supervisory control and data acquisition) software. One was in an ActiveXcontrol in WellinTech KingView V6.53 human machine interface (HMI) software used in power, water, and aerospace industries, mostly in China. The researcher publicly released exploit code for the hole and the vendor released an update that resolves the problem. The second vulnerability was reported in Progea's Movicon 11 HMI product, used primarily in Italy. It too has been patched.

• Also last week, a Russian firm released exploits targeting 11 unpatched, or zero-day, holes in SCADA software, which The Register was first to report.

• Three days ago, an Italian researcher publicly released information on dozens of unpatched holes in four different products and released exploits for targeting them. The move prompted an ICS-CERT warning.

• On Tuesday, Spanish researcher Ruben Santamarta told the BugTraq e-mail list that he had found flaws in BroadWin WebAccess, a Web browser-based HMI product from Advantech that ICS-CERT says is used in energy and other industries in North America, Asia, North Africa and the Middle East. Santamarta released details of the vulnerability and exploit code and ICS-CERT issued an alert.

• And yesterday, ICS-CERT released yet another advisory, this one warning about a SQL (Structured Query Language) vulnerability in the Ecava IntegraX or HMI product that could allow data leakage or manipulation as well as remote code execution on the backend host running the database service. Ecava has developed a patch for the hole.Security problems with software used to monitor and control systems in the electric grid, refineries, gas pipelines, and other critical operations are moving to the forefront as the industries adopt Web-based technologies and connect previously isolated networks to the Internet.

"What is the acceptable tolerable level for security with industrial control systems? We don't know," Mike Ahmadi, co-founder of consultancy GraniteKey told CNET. "Systems have been isolated from the outside world...It's a very significant change we're going through right now."

While the SCADA bug reports appear to be accelerating, it's unclear if any of the vulnerabilities have been used in attacks on working plants or systems.

However, last year the threat became reality with Stuxnet, sophisticated and multipronged attack targeting specific Siemens software used in industrial control operations that experts said appeared to be directed at nuclear facilities in Iran.

Just remember they lost control of those little internet nasties . . Sleep tight . .And Kiss the Server Good night . . .

Yes. They lost control - right.Plausible deniability...Who will they blame? Russia... China... No. Korea... ISIS/et al... some rogue white male gun-owning Trump supporter...So many possibilities. And encryption-free hacks are 'plug and play' even for teenagers in their parents basements.

Logged

And the King shall answer and say unto them, Verily I say unto you, Inasmuch as ye have done it unto one of the least of these my brethren, ye have done it unto me.Matthew 25:40